A group of Chinese hackers, of late, has ganged up to spoil the cyber system in Taiwan if the US …
Fourth Fappening – Hacker Pleads Guilty to Hacking into iCloud accounts of Celebrities
Fourth Fappening Hacker George Garofano,26 plead guilty in Federal court for computer hacking offense and the 26-year-old is going to …
Lenovo Discovered a Backdoor in Network Switches Which Allows Attacker Could Perform DDOS
Lenovo discovered a backdoor in network switches that powered by Enterprise Network Operating System firmware during the security audit by …
JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the …
Games removed from Google Play store after infected by porn malware
Google has deleted nearly 60 games app from its Play store after security researchers have informed them that these apps …
Cisco ETA – Provides Solution for Detecting Malware in Encrypted Traffic
Encrypted traffic is one of the biggest challenges in the security Industry and now Cisco comes with a solution for …
FIREWALK – Active Reconnaissance Network Security Tool
Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding …
Unknown Hackers demand Ransom in Bitcoin
Recently the news came out of a ransomware attack in Old Delhi after three of the hacked victims came forward …
Malicious Code in Kids Game Apps on Google Play Pushing Porn Ads – More than 60 Game Apps Infected
Cybercriminals started focussing on game apps which are used by children to install fake apps, registering premium services and porn …
Intel AMT Security Issue allows Local Attacker to get Complete Control Over any Laptop
Security researchers identified a significant security flaw with Intel AMT(Active Management Technology) utilized for remote monitoring and maintenance in corporate …